[SANS] Why Layered Security Strategies Do Not Work and What You Can Do About It

Every year, enterprises spend record levels of money on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of layered security in which enterprises support a wide variety of security technologies in order to discourage attackers doesn't seem to be working.

Its time to rethink IT security not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses a security architecture that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

- How the foundational architecture of a next-gen firewall and security platform matters in enabling the business, and protecting it against a wide variety of attacks.
- How the architecture enables unique and specific security scenarios.
- How the architecture supports a prevention-oriented approach.

Arista Networks Macro-Segmentation Service (MSS), a capability within Arista CloudVision and Arista Data Center Switches, addresses a growing gap in security deployment for hybrid data centers. Arista MSS extends the concept of fine-grained security for VMs to the rest of the data center by enabling dynamic firewall services insertion by integrating with leading Palo Alto Networks Next-Generation Firewalls (NGFW) in the data center.

Join our security experts and learn how you can deploy Arista MSS together with Palo Alto Networks NGFWs to inspect traffic and deliver robust security across a secure, resilient, and high-performance Arista data center fabric.

In this webinar you will:

· See demos on how best to deploy Palo Alto Networks firewalls across Arista MSS enabled next-generation data center
· Learn about design considerations for firewall insertion
· Hear real world deployment use cases and best practices
· Get your questions answered in our live Q&A

Learn how to protect your applications workloads across an Arista MSS enabled modern hybrid data center.

The technological shift to dynamic and scalable architectures brings agility and flexibility to network modernization— reducing the time to bring new services to market while enabling rapid service deployment. Operators are embracing a highly-distributed telco cloud environment that spans across multi-vendor, multi-site cloud infrastructures, primarily driven by performance and scalability requirements of the advanced 5G-enabled service offerings.

These evolving network architectural changes vastly impact security postures that mobile operators are required to adopt in their journey to 5G. As you prepare for your network transition by building 5G-ready telco clouds, you will need a resilient network with robust security mechanisms in place to support the diversity of 5G-enabled applications and services.

In this webcast, you will learn how to:
*Build a proactive defense around your robust telco cloud environments
*Enable cloud-agnostic security at scale across distributed cloud architectures
*Automate dynamic security policies in lockstep with workload creation and movements

The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system.

Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way.

In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will:
*Outline the common techniques attackers use
*Provide best practices to prevent further credential attacks
*Showcase Palo Alto Networks features you can enable now to protect your organization

Get your questions answered, and learn how to stop credential theft and abuse in your organization today.

For organizations like yours considering Cisco Application Centric Infrastructure (ACI) for the modern next-generation data center, you need to know the key requirements for security and how Palo Alto Networks is solving security challenges in a Cisco ACI fabric.

Join us and learn what every networking or security professional should know about how Palo Alto Networks firewalls can be integrated with Cisco ACI fabric to protect your application workloads across a Cisco ACI enabled hybrid data center.

In this webinar you will:

· See demos on how best to deploy Palo Alto Networks firewalls within Cisco ACI
· Learn about design considerations for firewall insertion
· Hear real world deployment use cases and best practices
· Get your questions answered in our live Q&A

Learn how best to deploy Cisco ACI and Palo Alto Networks technologies in your modern hybrid data center.

Skilled and stealthy attackers have broken into some of the best-protected organizations. They trick users, compromise hosts and utilize any number of other underhanded schemes to infiltrate targeted networks.

Your mission is simple on paper, but harder to execute in practice: find these hidden adversaries and root them out fast, before they can really do some serious damage.

Join our live webinar to learn the latest techniques for more efficient threat hunting and accelerated investigations. You’ll learn how to:

For many organisations, the cloud has become the sole route to market for new application deployments. It provides greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help organisations gain a competitive edge.

As a result, data and applications now live in multiple cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service. This complexity can result in poor visibility and an increase in vulnerabilities without an appropriate security and compliance strategy in place.

According to Forrester's Cloud Security Solutions Forecast 2018 to 2023 report, the global spend for cloud security technologies will reach $12.7 billion by 2023, mostly driven by financial services organizations. This spend likely won't flow into a single vendor, as organizations are increasingly relying on several options for securing their clouds.

Join this keynote panel of experts to learn more about the biggest trends in cloud security, as well as the best practices for securing your multi clouds:
- Crucial steps companies should be taking as they move data and processes to multiple cloud environments
- Understanding the shared responsibility model in the context of infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
- Protecting and planning for the future

To stay competitive, retailers are facing tremendous pressure to digitally transform their operations and accelerate the delivery of new business capabilities. Customers increasingly expect more personalized, differentiated experiences, both in-store and online.

Leveraging the cloud as a strategic enabler helps retailers accelerate this innovation and provides the flexibility to securely scale during peak buying periods like Black Friday, Cyber Monday or over busy holiday seasons.

Not long ago, Wayfair was like most companies – managing co-located data centers full of VMs and physical machines. Today, they’ve expanded their infrastructure footprint to Google Cloud Platform which houses Wayfair’s storefront application and serves thousands of customers every hour.

Join our live webinar with Wayfair’s senior manager of cloud security, Matt Helin, and learn about Wayfair’s move to the public cloud and how they addressed challenges around securing their Google Cloud environments by basically shifting security left in their journey.

Matt will be joined by Rob Sadowski, trust and security product lead for Google Cloud and Keith Mokris, product marketing manager for Prisma Cloud at Palo Alto Networks. Together, they’ll cover:

- How the cloud helps retailers accelerate innovation with flexibility to scale as needed
- Strategies for securely implementing infrastructure as code and containers
- Accelerating app development by taking a more CI/CD-based DevOps style approach

Cloud adoption has led to branch locations and mobile users going direct-to-internet, often without connecting to remote-access VPNs. The patchwork days of backhauling data over a VPN (or MPLS) to HQ then hair pinning it to the cloud to keep up with users are over. But, it doesn't mean maintaining consistent security at different locations has to be an obstacle. To keep up, you need to use the cloud to your advantage. By building security policies directly in the cloud, you create consistent protection wherever your users are, at headquarters, branch offices, or on the go as well as your applications, in the data center, and the cloud.

Join the webinar and learn key requirements for complete cloud security and walk away with confidence knowing you can:

- Protect any data stored within cloud applications
- Control access to the cloud from anywhere
- Secure access to all applications built in the cloud

Your security should be consistent wherever your users are, whether at headquarters, branch offices, or on the go. The same goes for your applications, whether in your data center or the cloud. However, maintaining consistent security at different locations, while also ensuring optimum networking and performance, is difficult, especially given the limitations of most networking and security technologies. First-generation cloud-delivered security, such as proxies, DNS filtering, and cloud access security broker proxies provide only limited security capabilities and often result in latency and other performance limitations.

Join this webinar for an in depth overview of how Prisma Access delivers protection from over 100 locations around the world from a cloud-native infrastructure that dramatically simplifies cloud access and networking – without compromising on security or performance. Key security and networking outcomes include:

- Secure traffic across all ports and all applications
- Support for complete networking and security needs for both mobile and remote networks

The new wave of innovative features – coming out almost daily – has led to excessively complex multi-cloud environments. Although IT and security organizations understand the Shared Responsibility Model conceptually, research shows a breakdown when the concept is put into practice.

During a year-long investigation, Palo Alto Networks Unit 42 threat research team collected data from more than 100 billion public cloud events and 21 recent high-profile cloud breaches, finding a consistent culprit: a lack of understanding around the Shared Responsibility Model, especially who is responsible for what. The resulting report provides comprehensive threat intelligence, tools and best practices to help fulfill your cloud security responsibilities.

In this webinar, we’ll discuss Unit 42’s findings, provide insight into attackers’ tactics, techniques and procedures, and give you some actionable prevention advice so you can go cloud-first safely and stop:

- Rising exposure risks from container adoption
- Malware from extending its reach into the cloud
- Cloud complexity from creating low-hanging fruit for attackers
- On-premises vulnerability management habits from carrying over to the cloud

Cloud-based collaboration applications enhance your employees’ productivity and enable collaboration with partners and others. However, this may also result in increased risk for data exposure – whether accidental or malicious. In addition, regulatory compliance requirements drive data protection needs. In this session, we will dive deep into how you can secure your data for various SaaS apps using our current and upcoming DLP capabilities, that can be used for all your SaaS data protection needs – whether it is data-in-motion or data-at-rest!

MITRE, the world's largest collector of real attack techniques, provides organizations with in-depth detail across 12 categories of tactics, how they're used, and how to mitigate them. Pulling from this data, the ATT&CK evaluation has quickly become the standard by which endpoint detection and response (EDR) offerings are judged through a real-world red/blue team exercise.

* How security emulation and testing tools were used to break into systems
* The details with real screen shots and specific outcomes of tested attack techniques across different products
* Why Forrester's ranking system is becoming the standard to evaluate EDR products and how you can use it
* How to objectively choose the right EDR based on Forrester's research

Recent technology trends have led to a marked increase in the amount of TLS traffic, as it provides confidentiality and trust. However, this also presents an opportunity for attackers to hide malicious activity and calls for an even more pressing need for SSL Decryption.

In this session, you will:
-Hear about recent innovations in PAN-OS 9.0 that help customers streamline SSL Decryption best practices and get full visibility into protocols like HTTP/2
-Learn about a best practice implementation strategy for SSL Decryption

Bring your questions for our experts, and come get a look at SSL Decryption "under the hood."

With mobile workers now using the cloud and the internet to access critical applications, it is crucial that businesses secure beyond their data center. However, with threats continuously advancing, traditional remote access VPN is just simply not enough.

In this session, our team of experts will discuss how with Global Protect businesses can:
· Extend consistent security policies to all workers regardless of their location
· Implement a zero trust architecture
· Protect against advanced threats

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.